Photo of Axel Bernard E Legay
  • Selma Lagerløfs Vej 300, 1-2-13

    9220 Aalborg Ø

    Denmark

  • Selma Lagerlöfs Vej 300, Cassiopeia

    9220 Aalborg

    Denmark

20152021
If you made any changes in Pure these will be visible here soon.

Research Output 2015 2019

  • 9 Article in proceeding
  • 1 Journal article
2019

Teaching Stratego to Play Ball: Optimal Synthesis for Continuous Space MDPs

Jaeger, M., Jensen, P. G., Larsen, K. G., Legay, A. B. E., Sedwards, S. & Taankvist, J. H., 28 Oct 2019, LNCS: ATVA 2019: Automated Technology for Verification and Analysis. Vol. 11781. p. 81-97

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

2018
1 Citation (Scopus)
171 Downloads (Pure)

Integrating Tools: Co-simulation in UPPAAL Using FMI-FMU

Nyman, U., Jensen, P. G., Larsen, K. G. & Legay, A., 15 Feb 2018, 22nd International Conference on Engineering of Complex Computer Systems, ICECCS 2017, Fukuoka, Japan, November 5-8, 2017. IEEE, p. 11-19 9 p.

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Open Access
File
Acoustic waves
Controllers
2017
4 Citations (Scopus)

Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata

Hansen, R. R., Jensen, P. G., Larsen, K. G., Legay, A. & Poulsen, D. B., 2017, Graphical Models for Security: 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers. Springer, p. 75-90 (Lecture Notes in Computer Science).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Open Access
2016
3 Citations (Scopus)

A Model-Based Framework for the Specification and Analysis of Hierarchical Scheduling Systems

Chadli, M., Kim, J. H., Legay, A., Traonouez, L. M., Naujokat, S., Bernhard, S. & Larsen, K. G., 2016, Critical Systems: Formal Methods and Automated Verification. Springer, p. 133–141 (Lecture Notes in Computer Science, Vol. 9933).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

5 Citations (Scopus)
100 Downloads (Pure)

Importance Sampling for Stochastic Timed Automata

Jegourel, C., Larsen, K. G., Legay, A., Mikučionis, M., Poulsen, D. B. & Sedwards, S., 2016, Dependable Software Engineering: Theories, Tools, and Applications. Fränzle, M., Kapur, D. & Zhan, N. (eds.). Springer, p. 163-178 16 p. (Lecture Notes in Computer Science, Vol. 9984).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

File
Importance sampling
17 Citations (Scopus)

Modelling Attack-defense Trees Using Timed Automata

Gadyatskaya, O., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C. & Poulsen, D. B., 2016, Formal Modeling and Analysis of Timed Systems. Springer, p. 35-50 (Lecture Notes in Computer Science, Vol. 9884).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

9 Citations (Scopus)

On the Power of Statistical Model Checking

Larsen, K. G. & Legay, A., 2016, Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications. Springer, p. 843–862 (Lecture Notes in Computer Science, Vol. 9953).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

Optimizing the resource requirements of hierarchical scheduling systems

Kim, J. H., Legay, A., Traonouez, L. M., Boudjadar, A., Nyman, U. M., Larsen, K. G., Lee, I. & Choi, J-Y., 2016, In : SIGBED Review. 13, 3, 8 p.

Research output: Contribution to journalJournal articleResearchpeer-review

14 Citations (Scopus)

Statistical Model Checking: Past, Present, and Future

Larsen, K. G. & Legay, A., 2016, Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques. Springer, p. 3–15 (Lecture Notes in Computer Science, Vol. 9952).

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

2015
9 Citations (Scopus)

Modelling Socio-Technical Attacks with Timed Automata

David, N., David, A., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C. & Probst, C., 2015, Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats. Association for Computing Machinery, p. 21-28 7 p.

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review